| ======= |
| LoadPin |
| ======= |
| |
| LoadPin is a Linux Security Module that ensures all kernel-loaded files |
| (modules, firmware, etc) all originate from the same filesystem, with |
| the expectation that such a filesystem is backed by a read-only device |
| such as dm-verity or CDROM. This allows systems that have a verified |
| and/or unchangeable filesystem to enforce module and firmware loading |
| restrictions without needing to sign the files individually. |
| |
| The LSM is selectable at build-time with ``CONFIG_SECURITY_LOADPIN``, and |
| can be controlled at boot-time with the kernel command line option |
| "``loadpin.enforce``". By default, it is enabled, but can be disabled at |
| boot ("``loadpin.enforce=0``"). |
| |
| LoadPin starts pinning when it sees the first file loaded. If the |
| block device backing the filesystem is not read-only, a sysctl is |
| created to toggle pinning: ``/proc/sys/kernel/loadpin/enabled``. (Having |
| a mutable filesystem means pinning is mutable too, but having the |
| sysctl allows for easy testing on systems with a mutable filesystem.) |
| |
| It's also possible to exclude specific file types from LoadPin using kernel |
| command line option "``loadpin.exclude``". By default, all files are |
| included, but they can be excluded using kernel command line option such |
| as "``loadpin.exclude=kernel-module,kexec-image``". This allows to use |
| different mechanisms such as ``CONFIG_MODULE_SIG`` and |
| ``CONFIG_KEXEC_VERIFY_SIG`` to verify kernel module and kernel image while |
| still use LoadPin to protect the integrity of other files kernel loads. The |
| full list of valid file types can be found in ``kernel_read_file_str`` |
| defined in ``include/linux/kernel_read_file.h``. |